Skip to main content

IDSes, Firewalls, and Honeypots

  • Chapter
  • First Online:
  • 3165 Accesses

Abstract

Routers, switches, and hubs are some of the networking devices used to establish connectivity among networked devices. However, they don't provide much control over access and security. Securing the network requires special-purpose devices like intrusion detection systems, firewalls, and honeypots. This chapter introduces these devices, their types, and the architectural considerations for their placement in the network.

This is a preview of subscription content, log in via an institution.

Buying options

eBook
USD   24.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   34.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Sagar Ajay Rahalkar

About this chapter

Cite this chapter

Rahalkar, S.A. (2016). IDSes, Firewalls, and Honeypots. In: Certified Ethical Hacker (CEH) Foundation Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2325-3_13

Download citation

Publish with us

Policies and ethics